Gervasi / Gavrilova / Kumar | Computational Science and Its Applications - ICCSA 2005 | E-Book | www2.sack.de
E-Book

E-Book, Englisch, Band 3480, 1234 Seiten, eBook

Reihe: Lecture Notes in Computer Science

Gervasi / Gavrilova / Kumar Computational Science and Its Applications - ICCSA 2005

International Conference, Singapore, May 9-12, 2005, Proceedings, Part I
2005
ISBN: 978-3-540-32043-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

International Conference, Singapore, May 9-12, 2005, Proceedings, Part I

E-Book, Englisch, Band 3480, 1234 Seiten, eBook

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-540-32043-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



The four volume set assembled following The 2005 International Conference on Computational Science and its Applications, ICCSA 2005, held in Suntec International Convention and Exhibition Centre, Singapore, from 9 May 2005 till 12 May 2005, represents the ?ne collection of 540 refereed papers selected from nearly 2,700 submissions. Computational Science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitioners in areas ranging from applications such as aerospace and automotive, to emerging technologies such as bioinformatics and nanotechnologies, to core disciplines such as ma- ematics, physics, and chemistry. Due to the shear size of many challenges in computational science, the use of supercomputing, parallel processing, and - phisticated algorithms is inevitable and becomes a part of fundamental t- oretical research as well as endeavors in emerging ?elds. Together, these far reaching scienti?c areas contribute to shape this Conference in the realms of state-of-the-art computational science research and applications, encompassing the facilitating theoretical foundations and the innovative applications of such results in other areas.

Gervasi / Gavrilova / Kumar Computational Science and Its Applications - ICCSA 2005 jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Information Systems and Information Technologies (ISIT) Workshop.- The Technique of Test Case Design Based on the UML Sequence Diagram for the Development of Web Applications.- Flexible Background-Texture Analysis for Coronary Artery Extraction Based on Digital Subtraction Angiography.- New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size.- An Automatic Resource Selection Scheme for Grid Computing Systems.- Matching Colors with KANSEI Vocabulary Using Similarity Measure Based on WordNet.- A Systematic Process to Design Product Line Architecture.- Variability Design and Customization Mechanisms for COTS Components.- A Fast Lossless Multi-resolution Motion Estimation Algorithm Using Selective Matching Units.- Developing an XML Document Retrieval System for a Digital Museum.- WiCTP: A Token-Based Access Control Protocol for Wireless Networks.- An Optimized Internetworking Strategy of MANET and WLAN.- An Internetworking Scheme for UMTS/WLAN Mobile Networks.- A Handover Scheme Based on HMIPv6 for B3G Networks.- Collaborative Filtering for Recommendation Using Neural Networks.- Dynamic Access Control Scheme for Service-Based Multi-netted Asymmetric Virtual LAN.- New Binding Update Method using GDMHA in Hierarchical Mobile IPv6.- Security in Sensor Networks for Medical Systems Torso Architecture.- Multimedia: An SIMD – Based Efficient 4x4 2 D Transform Method.- A Real-Time Cooperative Swim-Lane Business Process Modeler.- A Focused Crawling for the Web Resource Discovery Using a Modified Proximal Support Vector Machines.- A Performance Improvement Scheme of Stream Control Transmission Protocol over Wireless Networks.- Cache Management Protocols Based on Re-ordering for Distributed Systems.- DRC-BK: Mining Classification Rules by Using Boolean Kernels.- General-Purpose Text Entry Rules for Devices with 4x3 Configurations of Buttons.- Dynamic Load Redistribution Approach Using Genetic Information in Distributed Computing.- A Guided Search Method for Real Time Transcoding a MPEG2 P Frame into H.263 P Frame in a Compressed Domain.- Cooperative Security Management Enhancing Survivability Against DDoS Attacks.- Marking Mechanism for Enhanced End-to-End QoS Guarantees in Multiple DiffServ Environment.- An Efficient Handoff Mechanism with Web Proxy MAP in Hierarchical Mobile IPv6.- A New Carried-Dependence Self-scheduling Algorithm.- Improved Location Management Scheme Based on Autoconfigured Logical Topology in HMIPv6.- Ontological Model of Event for Integration of Inter-organization Applications.- Secure XML Aware Network Design and Performance Analysis.- A Probe Detection Model Using the Analysis of the Fuzzy Cognitive Maps.- Mobile Communications (Mobicomm) Workshop.- QoS Provisioning in an Enhanced FMIPv6 Architecture.- A Novel Hierarchical Routing Protocol for Wireless Sensor Networks.- A Vertical Handoff Algorithm Based on Context Information in CDMA-WLAN Integrated Networks.- Scalable Hash Chain Traversal for Mobile Devices.- A Rate Separation Mechanism for Performance Improvements of Multi-rate WLANs.- Improved Handoff Scheme for Supporting Network Mobility in Nested Mobile Networks.- A Prompt Retransmit Technique to Improve TCP Performance for Mobile Ad Hoc Networks.- Enhanced Fast Handover for Mobile IPv6 Based on IEEE 802.11 Network.- An Efficient Macro Mobility Scheme Supporting Fast Handover in Hierarchical Mobile IPv6.- Study on the Advanced MAC Scheduling Algorithm for the Infrared Dedicated Short Range Communication.- Design and Evaluation of a New Micro-mobility Protocol in Large Mobile and Wireless Networks.- Performance Analysis of Transmission Probability Control Scheme in Slotted ALOHA CDMA Networks.- RWA Based on Approximated Path Conflict Graphs in Optical Networks.- Secure Routing in Sensor Networks: Security Problem Analysis and Countermeasures.- Policy Based Handoff in MIPv6 Networks.- An Effective Location Management Strategy for Cellular Mobile Networks.- Authentication Authorization Accounting (AAA) Workshop.- On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards.- An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices.- Compact Linear Systolic Arrays for Multiplication Using a Trinomial Basis in GF(2 m ) for High Speed Cryptographic Processors.- A Secure User Authentication Protocol Based on One-Time-Password for Home Network.- On AAA with Extended IDK in Mobile IP Networks.- Secure Forwarding Scheme Based on Session Key Reuse Mechanism in HMIPv6 with AAA.- A Hierarchical Authentication Scheme for MIPv6 Node with Local Movement Property.- An Effective Authentication Scheme for Mobile Node with Fast Roaming Property.- A Study on the Performance Improvement to AAA Authentication in Mobile IPv4 Using Low Latency Handoff.- Authenticated Key Agreement Without Subgroup Element Verification.- Multi-modal Biometrics with PKIs for Border Control Applications.- A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment.- Service-Oriented Home Network Middleware Based on OGSA.- Implementation of Streamlining PKI System for Web Services.- Efficient Authentication for Low-Cost RFID Systems.- An Efficient Performance Enhancement Scheme for Fast Mobility Service in MIPv6.- Face Recognition by the LDA-Based Algorithm for a Video Surveillance System on DSP.- Computational Geometry and Applications (CGA’05) Workshop.- Weakly Cooperative Guards in Grids.- Mesh Generation for Symmetrical Geometries.- A Certified Delaunay Graph Conflict Locator for Semi-algebraic Sets.- The Offset to an Algebraic Curve and an Application to Conics.- Computing the Least Median of Squares Estimator in Time O(n d ).- Pocket Recognition on a Protein Using Euclidean Voronoi Diagram of Atoms.- Region Expansion by Flipping Edges for Euclidean Voronoi Diagrams of 3D Spheres Based on a Radial Data Structure.- Analysis of the Nicholl-Lee-Nicholl Algorithm.- Flipping to Robustly Delete a Vertex in a Delaunay Tetrahedralization.- A Novel Topology-Based Matching Algorithm for Fingerprint Recognition in the Presence of Elastic Distortions.- Bilateral Estimation of Vertex Normal for Point-Sampled Models.- A Point Inclusion Test Algorithm for Simple Polygons.- A Modified Nielson’s Side-Vertex Triangular Mesh Interpolation Scheme.- An Acceleration Technique for the Computation of Voronoi Diagrams Using Graphics Hardware.- On the Rectangular Subset Closure of Point Sets.- Computing Optimized Curves with NURBS Using Evolutionary Intelligence.- A Novel Delaunay Simplex Technique for Detection of Crystalline Nuclei in Dense Packings of Spheres.- Recognition of Minimum Width Color-Spanning Corridor and Minimum Area Color-Spanning Rectangle.- Volumetric Reconstruction of Unorganized Set of Points with Implicit Surfaces.- Virtual Reality in Scientific Applications and Learning (VRSAL 2005) Workshop.- Guided Navigation Techniques for 3D Virtual Environment Based on Topic Map.- Image Sequence Augmentation Using Planar Structures.- MultiPro: A Platform for PC Cluster Based Active Stereo Display System.- Two-Level 2D Projection Maps Based Horizontal Collision Detection Scheme for Avatar in Collaborative Virtual Environment.- A Molecular Modeling System Based on Dynamic Gestures.- Face Modeling Using Grid Light and Feature Point Extraction.- Virtual Chemical Laboratories and Their Management on the Web.- Tangible Tele-meeting System with DV-ARPN (Augmented Reality Peripheral Network).- Integrating Learning and Assessment Using the Semantic Web.- The Implementation of Web-Based Score Processing System for WBI.- ELCHEM: A Metalaboratory to Develop Grid e-Learning Technologies and Services for Chemistry.- Client Allocation for Enhancing Interactivity in Distributed Virtual Environments.- IMNET: An Experimental Testbed for Extensible Multi-user Virtual Environment Systems.- Application of MPEG-4 in Distributed Virtual Environment.- A New Approach to Area of Interest Management with Layered-Structures in 2D Grid.- Awareness Scheduling and Algorithm Implementation for Collaborative Virtual Environment.- M of N Features vs. Intrusion Detection.- Molecular Structures and Processes Workshop.- High-Level Quantum Chemical Methods for the Study of Photochemical Processes.- Study of Predictive Abilities of the Kinetic Models of Multistep Chemical Reactions by the Method of Value Analysis.- Lateral Interactions in O/Pt(111): Density-Functional Theory and Kinetic Monte Carlo.- Intelligent Predictive Control with Locally Linear Based Model Identification and Evolutionary Programming Optimization with Application to Fossil Power Plants.- Determination of Methanol and Ethanol Synchronously in Ternary Mixture by NIRS and PLS Regression.- Ab Initio and Empirical Atom Bond Formulation of the Interaction of the Dimethylether-Ar System.- A Parallel Framework for the Simulation of Emission, Transport, Transformation and Deposition of Atmospheric Mercury on a Regional Scale.- A Cognitive Perspective for Choosing Groupware Tools and Elicitation Techniques in Virtual Teams.- A Fast Method for Determination of Solvent-Exposed Atoms and Its Possible Applications for Implicit Solvent Models.- Thermal Rate Coefficients for the N + N 2 Reaction: Quasiclassical, Semiclassical and Quantum Calculations.- A Molecular Dynamics Study of Ion Permeability Through Molecular Pores.- Theoretical Investigations of Atmospheric Species Relevant for the Search of High-Energy Density Materials.- Pattern Recognition and Ubiquitous Computing Workshop.- ID Face Detection Robust to Color Degradation and Facial Veiling.- Detection of Multiple Vehicles in Image Sequences for Driving Assistance System.- A Computational Model of Korean Mental Lexicon.- A Realistic Human Face Modeling from Photographs by Use of Skin Color and Model Deformation.- An Optimal and Dynamic Monitoring Interval for Grid Resource Information System.- Real Time Face Detection and Recognition System Using Haar-Like Feature/HMM in Ubiquitous Network Environments.- A Hybrid Network Model for Intrusion Detection Based on Session Patterns and Rate of False Errors.- Energy-Efficiency Method for Cluster-Based Sensor Networks.- A Study on an Efficient Sign Recognition Algorithm for a Ubiquitous Traffic System on DSP.- Real-Time Implementation of Face Detection for a Ubiquitous Computing.- On Optimizing Feature Vectors from Efficient Iris Region Normalization for a Ubiquitous Computing.- On the Face Detection with Adaptive Template Matching and Cascaded Object Detection for Ubiquitous Computing Environment.- On Improvement for Normalizing Iris Region for a Ubiquitous Computing.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.